Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Martijn Grooten
On Wed, 4 Sep 2013, mirimir wrote: China seems to know how to detect Tor traffic. Are their methods public knowledge? I don't know. But can they detect a Tor user (or bot) in Brazil connecting to a hidden service running on a server in Sweden? For that's what would matter here. Growing a b

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread grarpamp
> I wonder if grarpamp has seen a bunch of new hidden services. Not as of around Aug 30. Then again, I'm watching the deepweb, not really as dirs (yet... it seems doable, others have, looking into it). -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settin

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 My router has also dnsmasq running, but this is not crashing. Although the requests are quite high. I have an iptables rule for the directory port of tor and the rest of my ports. The directory port is hit dramatically since 2 1/2 weeks. The othe

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread grarpamp
On 9/4/13, The Doctor wrote: >> How would one identify new, and suddenly very popular, hidden >> services? > > it's a technique for correlating publically known > Tor nodes against hidden services: > > http://cybermashup.com/2013/09/04/dont-run-a-tor-router-and-a-hidden-service-from-the-same-conn

Re: [tor-talk] TBB 3 alpha logging

2013-09-05 Thread Lunar
Sebastian G. : > with TBB 3 (currently in alpha) Vidalia is no longer included. > > How will a user be able to see stuff that happens, which normally would > show up in the log of Vidalia? For example clock-skew which will be > something the user is expected to correct. How, if he/she does not get

[tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread Eugen Leitl
http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf Content and popularity analysis of Tor hidden services July 29, 2013 Alex Biryukov University of Luxembourg alex.biryu...@uni.lu Ivan Pustogarov University of Luxembourg ivan.pustoga...@uni.lu Ralf-Philipp Weinmann University of Lu

[tor-talk] Tor 0.2.4.17-rc is out

2013-09-05 Thread Roger Dingledine
Tor 0.2.4.17-rc is the third release candidate for the Tor 0.2.4.x series. It adds an emergency step to help us tolerate the massive influx of users: 0.2.4 clients using the new (faster and safer) "NTor" circuit-level handshakes now effectively jump the queue compared to the 0.2.3 clients using "TA

Re: [tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread Lunar
Eugen Leitl: > http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf > > Content and popularity analysis of Tor hidden services Watch out for dead horses [1] and see the previous discussion [2]. [1] https://en.wikipedia.org/wiki/Flogging_a_dead_horse [2] https://lists.torproject.org/piper

Re: [tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread Eugen Leitl
On Thu, Sep 05, 2013 at 12:45:42PM +0200, Lunar wrote: > Eugen Leitl: > > http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf > > > > Content and popularity analysis of Tor hidden services > > Watch out for dead horses [1] and see the previous discussion [2]. I'm glad you can work fullt

Re: [tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread Lunar
Lunar: > Eugen Leitl: > > http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf > > > > Content and popularity analysis of Tor hidden services > > Watch out for dead horses and see the previous discussion. Please accept my apologies, this is a different paper. (Copy/pasted the wrong URL

Re: [tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread Asa Rossoff
>From Lunar: > Eugen Leitl: >> http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf >> >> Content and popularity analysis of Tor hidden services > > Watch out for dead horses [1] and see the previous discussion [2]. > > [1] https://en.wikipedia.org/wiki/Flogging_a_dead_horse > [2] https:

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread Moustache
Hi, Quick analysis of a Tor related malware which might be of interest and related to the Tor network overload. http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/ -moustache -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change oth

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Steve Seltzer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 9/4/2013 7:33 PM, Moritz Bartl wrote: > On 09/04/2013 07:14 PM, The Doctor wrote: >> http://cybermashup.com/2013/09/04/dont-run-a-tor-router-and-a-hidden-service-from-the-same-connection/ >> >> Thoughts from the community? > > https://www.torproje

[tor-talk] High RAM usage

2013-09-05 Thread Roman Mamedov
Hello, It used to be that one could easily run a Tor relay in 512MB of RAM with lots of headroom remaining. However, here is what I am now seeing on some nodes: - KiB Mem:508936 total, 503728 used, 5208 free, 48 buffers KiB Swap: 1048572 total, 278072 used, 770500 free,

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread Anton Nikishaev
Roger Dingledine writes: > Anybody know details? It's easy to speculate (Pirate Browser publicity > gone overboard? People finally reading about the NSA thing? Botnet?), > but some good solid facts would sure be useful. Check this out http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-rece

[tor-talk] Tor Project Fora Critique

2013-09-05 Thread Eugen Leitl
- Forwarded message from John Young - Date: Thu, 05 Sep 2013 09:41:49 -0400 From: John Young To: cypherpu...@cpunks.org Subject: Tor Project Fora Critique X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Tor Project discussion lists have become characterized by a a tone of dismissivene

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread Robert G
Is the fundamental problem that these clients are connecting to TOR without the user knowing? Could there be an initial, one time, human test for for access? Unique tokens could be granted after a CAPTCHA, or something similar, and exchanged for initial handshakes between routers and clients. Of

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread BM-2D9WhbG2VeKsLCsGBTPLGwDLQyPizSqS85
I'm well out of my depth here in terms of technical expertise so please take this question with a huge grain of salt, but the dialogue on this thread makes me wonder: Should the probably very slim likelihood that someone may have somehow spoofed Tor's metrics be considered alongside other hypothes

Re: [tor-talk] Tor censored, but VPNs not?

2013-09-05 Thread grarpamp
On 9/5/13, adrelanos wrote: > If yes, is it advisable in such cases to use a VPN for easy circumvention? I think I've seen fingerprint checks in tor bootstrap for the dirauths and so on down the chain. So I don't see a problem binding the local tor client to a vpn interface address... if you get

[tor-talk] Tor censored, but VPNs not?

2013-09-05 Thread adrelanos
Are there cases, where a censor prevents access to the public Tor network, but does not block access to VPN services? If yes, is it advisable in such cases to use a VPN for easy circumvention? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to

Re: [tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread grarpamp
On 9/5/13, Asa Rossoff wrote: > - It exposes an estimate on how manny hidden services existed at the time > of the study > - It gives a breakdown of what services/some of the services those hidden > services offered. > - It categories HTTP(S) services by content type, which is interesting. > - It

Re: [tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread Asa Rossoff
>From grarpamp: > On 9/5/13, Asa Rossoff wrote: >> - It exposes an estimate on how many hidden services existed at the time >> of the study >> - It gives a breakdown of what services/some of the services those hidden >> services offered. >> - It categories HTTP(S) services by content type, which i

[tor-talk] Does latest Tor Browser version support remembering passwords?

2013-09-05 Thread Edgar S
I'm running on an old version of Tor Browser because every new version I've tried does not support remembering passwords or leaving on the option to remember passwords over new invocations. Has this ever been fixed? Is it even scheduled to be fixed? -- tor-talk mailing list - tor-talk@lists.tor

[tor-talk] Privacy of Tor,

2013-09-05 Thread Nathan Suchy
How private is Tor? Sent from my Android so do not expect a fast, long, or perfect response... -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

[tor-talk] Could we redesign Tor to...

2013-09-05 Thread Nathan Suchy
Handle a massive amount of nodes. Just give us random nodes from the list so the network can handle having more middle and exit nodes. I'd like to see Tor actually make all clients a middle node so we have more internal bandwidth... Sent from my Android so do not expect a fast, long, or perfect re

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread mirimir
On 09/05/2013 03:05 PM, Robert G wrote: > Is the fundamental problem that these clients are connecting to TOR without > the user knowing? It depends on how you define "user" ;( If they're bots, computer owners don't know. But the botnet owner does. > Could there be an initial, one time, human t

Re: [tor-talk] Content and popularity analysis of Tor hidden services

2013-09-05 Thread grarpamp
>> Forgoing the nonpublished services largely used only by their creators, >> all the above regarding the publicly known services have been going >> on in the wikis and other onionland metaprojects for many years. > You may be right in everything you say, but you technically omit the > category "n

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread Griffin Boyce
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 So here are some basic facts about the server that's distributing the purported botnet file: * They're running Ubuntu 9.04 & nginx 1.1.19 * OpenSSH is set up on the server * The SSL cert is a wildcard from GoDaddy, issued for *.xecu.net, create

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Pokokohua
>* mirimir:*> That depends. If it's drawing on random clueless Windows users, >as most> botnets do, I don't see why it wouldn't show up in honeypots. If >it's> not showing up, it might be a feature rollout. Or it might not really >be> a physical botnet, but rather something very cleaver that loo

Re: [tor-talk] Does latest Tor Browser version support remembering passwords?

2013-09-05 Thread krishna e bera
On 13-09-05 04:20 PM, Edgar S wrote: > I'm running on an old version of Tor Browser because every new version > I've tried does not support remembering passwords or leaving on the > option to remember passwords over new invocations. Has this ever been > fixed? Is it even scheduled to be fixed? The

Re: [tor-talk] Privacy of Tor,

2013-09-05 Thread mirimir
On 09/05/2013 09:55 PM, krishna e bera wrote: > On 13-09-05 03:59 PM, Nathan Suchy wrote: >> How private is Tor? > > What do you mean by private? > > The Users of Tor article shows several types of users with different > privacy needs. https://www.torproject.org/about/torusers.html.en > > The

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread krishna e bera
On 13-09-05 03:58 PM, mirimir wrote: > On 09/05/2013 03:05 PM, Robert G wrote: >> Could there be an initial, one time, human test for for access? Unique >> tokens could be granted after a CAPTCHA, or something similar, and >> exchanged for initial handshakes between routers and clients. Of course

Re: [tor-talk] TBB 3 alpha logging

2013-09-05 Thread Sebastian G.
05.09.2013 11:45, Lunar: > Sebastian G. : >> with TBB 3 (currently in alpha) Vidalia is no longer included. >> >> How will a user be able to see stuff that happens, which normally would >> show up in the log of Vidalia? For example clock-skew which will be >> something the user is expected to corre

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread mirimir
On 09/05/2013 09:42 PM, Pokokohua wrote: >> * mirimir:*> That depends. If it's drawing on random clueless Windows users, >> as most> botnets do, I don't see why it wouldn't show up in honeypots. If >> it's> not showing up, it might be a feature rollout. Or it might not really >> be> a physical

Re: [tor-talk] Privacy of Tor,

2013-09-05 Thread krishna e bera
On 13-09-05 03:59 PM, Nathan Suchy wrote: > How private is Tor? What do you mean by private? The Users of Tor article shows several types of users with different privacy needs. https://www.torproject.org/about/torusers.html.en The notes on the Tor download page give some hints how to ensure you

Re: [tor-talk] Many more Tor users in the past week?

2013-09-05 Thread adrelanos
krishna e bera: > On 13-09-05 03:58 PM, mirimir wrote: >> On 09/05/2013 03:05 PM, Robert G wrote: >>> Could there be an initial, one time, human test for for access? Unique >>> tokens could be granted after a CAPTCHA, or something similar, and >>> exchanged for initial handshakes between routers a

[tor-talk] Tor users are not anonymous

2013-09-05 Thread sigi
Hi, two main german technology news sites are spreading news about the study: »Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries« [1] They write about 'broken anonymity' for Tor-users: Tor-Nutzer surfen nicht anonym - Tor users do not surf anonymously

Re: [tor-talk] Tor users are not anonymous

2013-09-05 Thread Andrew F
>From http://translate.google.com/ On the basis of patterns can be easily identified despite Tor users anonymity than expected. The have Aaron Johnson , Chris Wacek , Micah Sherr and Paul Syverson studied in a scientific study . The authors have investigated here the data that go into the Tor netw

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Pokokohua
Still hard for me to imagine such a large scale infection of what I assume is home user computers without anyone other than TOR'ists picking up on it. According to the stats its sitting at about 25 million new users? On Fri, Sep 6, 2013 at 10:13 AM, mirimir wrote: > On 09/05/2013 09:42 PM, Pokok

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread mirimir
On 09/05/2013 11:42 PM, Pokokohua wrote: > Still hard for me to imagine such a large scale infection of what I assume > is home user computers without anyone other than TOR'ists picking up on it. > According to the stats its sitting at about 25 million new users? No, it's 2.5 million new users.

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Pokokohua
Oh that makes so much more sense now ;) thanks for that. On Fri, Sep 6, 2013 at 12:26 PM, mirimir wrote: > On 09/05/2013 11:42 PM, Pokokohua wrote: > > > Still hard for me to imagine such a large scale infection of what I > assume > > is home user computers without anyone other than TOR'ists pi